ingress and egress filtering
- ingress and egress filtering
входная и выходная фильтрация
Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. .
1998-2007.
Смотреть что такое "ingress and egress filtering" в других словарях:
Egress filtering — In computer networking, egress filtering is a method of filtering electronic traffic that contributes to the security of a network and therefore makes it less prone to attacks from crackers.This method of filtering prevents crackers from using a… … Wikipedia
Ingress filtering — In computer networking, ingress filtering is a technique used to make sure that incoming packets are actually from the networks that they claim to be from. Contents 1 Problem 2 Solution 3 Networks 4 See also … Wikipedia
Ingress — may refer to:*The act of entering. Antonym of egress. *A type of noise typically encountered when using coaxial cable *Ingress Bell (1834 1913), an English architect *Ingress filtering, a computer network packet filtering technique *Ingress… … Wikipedia
входная и выходная фильтрация — Метод защиты от хакерских атак путем фильтрации фальшивых IP адресов на входе и выходе узла сети. [http://www.morepc.ru/dict/] Тематики информационные технологии в целом EN ingress and egress filtering … Справочник технического переводчика
IP traceback — is a name given to any method for reliably determining the origin of a packet on the Internet. The datagram nature of the Internet makes it difficult to determine the originating host of a packet – the source id supplied in an IP packet can be… … Wikipedia
Synchronous optical networking — (SONET) and Synchronous Digital Hierarchy (SDH), are two closely related multiplexing protocols for transferring multiple digital bit streams using lasers or light emitting diodes (LEDs) over the same optical fiber. The method was developed to… … Wikipedia
IP address spoofing — In computer networking, the term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing… … Wikipedia
Comparison of firewalls — The following tables compare different aspects of a number of firewalls, starting from simple home firewalls up to the most sophisticated Enterprise firewalls. Contents 1 Firewall software 2 Firewall rule set basic filtering features comparison 3 … Wikipedia
Network Monitoring Interface Card — A network monitoring interface card or NMIC is similar to a network card (NIC). However, unlike a standard network card, an NMIC is designed to passively (and silently) listen on a network. At a functional level, an NMIC may differ from a NIC, in … Wikipedia
Radio transmitter design — In plate modulation systems the voltage delivered to the stage is changed. As the power output available is a function of the supply voltage, the output power is modulated. This can be done using a transformer to alter the anode (plate) voltage.… … Wikipedia
Network calculus — is a theoretical framework for analysing performance guarantees in computer networks. As traffic flows through a network it is subject to constraints imposed by the system components, for example: link capacity traffic shapers (leaky buckets)… … Wikipedia